SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
FusionX &
Accenture:
One global
Security team
2
FusionX
An elite and sophisticated cyber
security team
Copyright © 2015 Accenture All rights reserved.
• 20-year legacy providing tactical vulnerability assessment and
surgical penetration testing services against a wide variety of
organizations and targets.
• Focused on unique talent and experience of our elite
assessment team, rather than on automated tools.
• Targets information assets using the tailored tactics,
techniques and procedures (TTP’s) of your most likely
attackers to evaluate resiliency to a real-world attack.
• Develops effective risk management strategies that focus on
current and emerging threats while maintaining efficient
business operations.
3Copyright © 2015 Accenture All rights reserved.
FusionX works with your management and security teams to
align your risk management practices and procedures with
organizational goals and expectations.
The end result? A comprehensive risk management program,
nuanced to your unique business environment.
Our Approach
Leading businesses to a unique and
comprehensive plan for implementation
4Copyright © 2015 Accenture All rights reserved.
FusionX’s advanced threat capabilities complement
Accenture’s security experience, technology and teams to
address the toughest cyber security challenges.
Accenture’s industrialized suite of offerings—including Digital
Identity, Cyber Defense, and Managed Security—embed
security into the fabric of digital operations, enabling agility,
protecting the broader ecosystem and delivering sustainable
business outcomes.
Together, we help clients remediate cyber security
weaknesses—at a global scale.
FusionX & Accenture
Helping clients manage risk and
improve business results—globally
5Copyright © 2015 Accenture All rights reserved.
FusionX Successes
6
The Outside Insider
Copyright © 2015 Accenture All rights reserved.
The situation
A publicly traded company believes they have an insider
engaging in malicious activity. FusionX deploys an Incident
Response team to investigate.
The support
FusionX works with the client’s staff to investigate the incident
and discovers that the incident is actually the work of organized
crime engaging in large-scale fraud impacting hundreds of
thousands of customers.
The solution
FusionX identifies the attack pathways, engages in
attribution activities and devises a strategy to oust the
attackers and secure the network from future attack.
7
Boardroom Blues
Copyright © 2015 Accenture All rights reserved.
The situation
A multi-billion dollar investment firm engages FusionX for an
enterprise wide, tactical penetration test.
The support
The team discovers dozens of critical vulnerabilities, including
one that allows the team to eavesdrop on the board room via
the Internet.
The solution
FusionX identifies the enterprise vulnerabilities and provides
prioritized recommendations for remediation. Subsequent
assessments reveal a significantly improved vulnerability
profile.
8
Crown Jewels
Copyright © 2015 Accenture All rights reserved.
The situation
The CEO of a Global 100 company wants to know how well his
company’s intellectual property is protected from a
sophisticated adversary. FusionX engages in a penetration test
without the knowledge of the corporate security team.
The support
FusionX discovers a zero-day vulnerability in a custom-built
application that allows the attack team to successfully and
silently penetrate the corporate network. Within weeks, the
team has exfiltrated gigabytes of sensitive data from the
division the CEO wanted specifically targeted.
The solution
The CEO is able to re-align security priorities and the
internal security team mitigates the vulnerabilities
discovered by the FusionX team.
9
Money for Nothing
Copyright © 2015 Accenture All rights reserved.
The situation
A large domestic bank has spent millions of dollars on security
testing and products. The CISO challenges FusionX to find
something they’ve missed.
The support
Within a week, FusionX identifies a systemic, zero-day
vulnerability on their Internet-facing web application that allows
the virtual creation and withdrawal of funds.
The solution
The bank quickly moves to remediate the issue with a
temporary fix and commences a long-term project to remediate
the systemic problem. FusionX provides further data to the
bank to ensure that the issue has not been previously
exploited. Ultimately, the vulnerability was identified prior to
being exploited by a sophisticated attacker.
About Accenture
Accenture is a global management
consulting, technology services and
outsourcing company, with more than
336,000 people serving clients in more than
120 countries. Combining unparalleled
experience, comprehensive capabilities
across all industries and business
functions, and extensive research on the
world’s most successful companies,
Accenture collaborates with clients to help
them become high-performance businesses
and governments. The company generated
net revenues of US$30.0 billion for the
fiscal year ended Aug. 31, 2014. Its home
page is www.accenture.com.
Copyright © 2015 Accenture
All rights reserved.
Accenture, its logo, and
High Performance Delivered
are trademarks of Accenture.
Contact us
www.fusionx.com
accenture.com/security

Contenu connexe

Tendances

Reduce Operating Costs and Accelerate Efficiency by Migrating Your SAP Applic...
Reduce Operating Costs and Accelerate Efficiency by Migrating Your SAP Applic...Reduce Operating Costs and Accelerate Efficiency by Migrating Your SAP Applic...
Reduce Operating Costs and Accelerate Efficiency by Migrating Your SAP Applic...Amazon Web Services
 
Resume-Vivek Mohan (BI & Analytics Enterprise Architect) - Looking for an opp...
Resume-Vivek Mohan (BI & Analytics Enterprise Architect) - Looking for an opp...Resume-Vivek Mohan (BI & Analytics Enterprise Architect) - Looking for an opp...
Resume-Vivek Mohan (BI & Analytics Enterprise Architect) - Looking for an opp...Vivek Mohan
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsDATAVERSITY
 
Accenture Public Service - The Future of Government Back Office Operations
Accenture Public Service - The Future of Government Back Office OperationsAccenture Public Service - The Future of Government Back Office Operations
Accenture Public Service - The Future of Government Back Office Operationsaccenture
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at ScaleDATAVERSITY
 
Modernize Core Technology to Accelerate Digital Transformation
Modernize Core Technology to Accelerate Digital TransformationModernize Core Technology to Accelerate Digital Transformation
Modernize Core Technology to Accelerate Digital TransformationPerficient, Inc.
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileaccenture
 
LeanIX-ServiceNow Integration
LeanIX-ServiceNow IntegrationLeanIX-ServiceNow Integration
LeanIX-ServiceNow IntegrationLeanIX GmbH
 
Modernizing Integration with Data Virtualization
Modernizing Integration with Data VirtualizationModernizing Integration with Data Virtualization
Modernizing Integration with Data VirtualizationDenodo
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureDATAVERSITY
 
Digital Transformation Strategy & Framework | By ex-McKinsey
Digital Transformation Strategy & Framework | By ex-McKinseyDigital Transformation Strategy & Framework | By ex-McKinsey
Digital Transformation Strategy & Framework | By ex-McKinseyAurelien Domont, MBA
 
Future Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | AccentureFuture Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | Accentureaccenture
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Alan McSweeney
 
Modern HR, Communication, & Leadership Best Practices With Microsoft 365
Modern HR, Communication, & Leadership Best Practices With Microsoft 365Modern HR, Communication, & Leadership Best Practices With Microsoft 365
Modern HR, Communication, & Leadership Best Practices With Microsoft 365Richard Harbridge
 
Building a Data Strategy Your C-Suite Will Support
Building a Data Strategy Your C-Suite Will SupportBuilding a Data Strategy Your C-Suite Will Support
Building a Data Strategy Your C-Suite Will SupportReid Colson
 
Lessons in Data Modeling: Data Modeling & MDM
Lessons in Data Modeling: Data Modeling & MDMLessons in Data Modeling: Data Modeling & MDM
Lessons in Data Modeling: Data Modeling & MDMDATAVERSITY
 
Augmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessmentAugmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessmentPrashanth Panduranga
 
Delivering Data Democratization in the Cloud with Snowflake
Delivering Data Democratization in the Cloud with SnowflakeDelivering Data Democratization in the Cloud with Snowflake
Delivering Data Democratization in the Cloud with SnowflakeKent Graziano
 
Ever–ready for every opportunity
Ever–ready for every opportunityEver–ready for every opportunity
Ever–ready for every opportunityaccenture
 
Empowering Digital Workers
Empowering Digital WorkersEmpowering Digital Workers
Empowering Digital Workersaccenture
 

Tendances (20)

Reduce Operating Costs and Accelerate Efficiency by Migrating Your SAP Applic...
Reduce Operating Costs and Accelerate Efficiency by Migrating Your SAP Applic...Reduce Operating Costs and Accelerate Efficiency by Migrating Your SAP Applic...
Reduce Operating Costs and Accelerate Efficiency by Migrating Your SAP Applic...
 
Resume-Vivek Mohan (BI & Analytics Enterprise Architect) - Looking for an opp...
Resume-Vivek Mohan (BI & Analytics Enterprise Architect) - Looking for an opp...Resume-Vivek Mohan (BI & Analytics Enterprise Architect) - Looking for an opp...
Resume-Vivek Mohan (BI & Analytics Enterprise Architect) - Looking for an opp...
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Accenture Public Service - The Future of Government Back Office Operations
Accenture Public Service - The Future of Government Back Office OperationsAccenture Public Service - The Future of Government Back Office Operations
Accenture Public Service - The Future of Government Back Office Operations
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Modernize Core Technology to Accelerate Digital Transformation
Modernize Core Technology to Accelerate Digital TransformationModernize Core Technology to Accelerate Digital Transformation
Modernize Core Technology to Accelerate Digital Transformation
 
Engineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibileEngineering Services: con gli ingegneri per creare valore sostenibile
Engineering Services: con gli ingegneri per creare valore sostenibile
 
LeanIX-ServiceNow Integration
LeanIX-ServiceNow IntegrationLeanIX-ServiceNow Integration
LeanIX-ServiceNow Integration
 
Modernizing Integration with Data Virtualization
Modernizing Integration with Data VirtualizationModernizing Integration with Data Virtualization
Modernizing Integration with Data Virtualization
 
Enterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data ArchitectureEnterprise Architecture vs. Data Architecture
Enterprise Architecture vs. Data Architecture
 
Digital Transformation Strategy & Framework | By ex-McKinsey
Digital Transformation Strategy & Framework | By ex-McKinseyDigital Transformation Strategy & Framework | By ex-McKinsey
Digital Transformation Strategy & Framework | By ex-McKinsey
 
Future Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | AccentureFuture Ready Enterprise Systems | Accenture
Future Ready Enterprise Systems | Accenture
 
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
Data Integration, Access, Flow, Exchange, Transfer, Load And Extract Architec...
 
Modern HR, Communication, & Leadership Best Practices With Microsoft 365
Modern HR, Communication, & Leadership Best Practices With Microsoft 365Modern HR, Communication, & Leadership Best Practices With Microsoft 365
Modern HR, Communication, & Leadership Best Practices With Microsoft 365
 
Building a Data Strategy Your C-Suite Will Support
Building a Data Strategy Your C-Suite Will SupportBuilding a Data Strategy Your C-Suite Will Support
Building a Data Strategy Your C-Suite Will Support
 
Lessons in Data Modeling: Data Modeling & MDM
Lessons in Data Modeling: Data Modeling & MDMLessons in Data Modeling: Data Modeling & MDM
Lessons in Data Modeling: Data Modeling & MDM
 
Augmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessmentAugmenting IT strategy with Enterprise architecture assessment
Augmenting IT strategy with Enterprise architecture assessment
 
Delivering Data Democratization in the Cloud with Snowflake
Delivering Data Democratization in the Cloud with SnowflakeDelivering Data Democratization in the Cloud with Snowflake
Delivering Data Democratization in the Cloud with Snowflake
 
Ever–ready for every opportunity
Ever–ready for every opportunityEver–ready for every opportunity
Ever–ready for every opportunity
 
Empowering Digital Workers
Empowering Digital WorkersEmpowering Digital Workers
Empowering Digital Workers
 

En vedette

Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...
Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...
Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...accenture
 
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvAccenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvSunanda Balla
 
GeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM Careers
GeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM CareersGeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM Careers
GeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM CareersCheryl Platz
 
If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...
If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...
If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...Jess Lee
 
Reflections on ‘freedom to live a valued life’ - Dr Lynne Friedli
Reflections on ‘freedom to live a valued life’ - Dr Lynne FriedliReflections on ‘freedom to live a valued life’ - Dr Lynne Friedli
Reflections on ‘freedom to live a valued life’ - Dr Lynne FriedliIriss
 
Bereavement and Loss Counselling
Bereavement and Loss CounsellingBereavement and Loss Counselling
Bereavement and Loss CounsellingGeorge Wells
 
Grief Matters, Responding to Loss and Bereavement - Mike O'Connor
Grief Matters, Responding to Loss and Bereavement - Mike O'ConnorGrief Matters, Responding to Loss and Bereavement - Mike O'Connor
Grief Matters, Responding to Loss and Bereavement - Mike O'ConnorIriss
 
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, Adgetec
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, AdgetecCES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, Adgetec
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, AdgetecMark Mueller-Eberstein
 
Interconnect_Blockchain One Year On
Interconnect_Blockchain One Year OnInterconnect_Blockchain One Year On
Interconnect_Blockchain One Year OnKathryn Harrison
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Edward Bukstel
 
Accenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for InsuranceAccenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for InsuranceAccenture Insurance
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesSébastien Tandel
 
Harrison lsri blockchain 2017
Harrison lsri blockchain 2017Harrison lsri blockchain 2017
Harrison lsri blockchain 2017Colin Harrison
 
BlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists
 
Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017megaradioexpress
 
Getting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That WorksGetting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That WorksSwords to Plowshares
 
Bloco Esquerda
Bloco EsquerdaBloco Esquerda
Bloco Esquerdaamattos76
 
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.Nayma Consultores
 

En vedette (20)

Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...
Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...
Accenture 2015 Global Risk Management Study: Capital Markets Key Findings and...
 
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctvAccenture video-analytics-operational-marketing-and-security-insights-from-cctv
Accenture video-analytics-operational-marketing-and-security-insights-from-cctv
 
GeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM Careers
GeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM CareersGeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM Careers
GeekGirlCon 2011 / Computer Engineer Barbie: Attracting Girls to STEM Careers
 
If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...
If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...
If I Could Go Back in Time, Here’s What I Would Tell Myself about Careers in ...
 
Reflections on ‘freedom to live a valued life’ - Dr Lynne Friedli
Reflections on ‘freedom to live a valued life’ - Dr Lynne FriedliReflections on ‘freedom to live a valued life’ - Dr Lynne Friedli
Reflections on ‘freedom to live a valued life’ - Dr Lynne Friedli
 
Bereavement and Loss Counselling
Bereavement and Loss CounsellingBereavement and Loss Counselling
Bereavement and Loss Counselling
 
Grief Matters, Responding to Loss and Bereavement - Mike O'Connor
Grief Matters, Responding to Loss and Bereavement - Mike O'ConnorGrief Matters, Responding to Loss and Bereavement - Mike O'Connor
Grief Matters, Responding to Loss and Bereavement - Mike O'Connor
 
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, Adgetec
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, AdgetecCES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, Adgetec
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, Adgetec
 
Interconnect_Blockchain One Year On
Interconnect_Blockchain One Year OnInterconnect_Blockchain One Year On
Interconnect_Blockchain One Year On
 
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017Healthcare Blockchain Summit, Washington DC Mar 21, 2017
Healthcare Blockchain Summit, Washington DC Mar 21, 2017
 
Accenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for InsuranceAccenture Security Report 2016 Infographic for Insurance
Accenture Security Report 2016 Infographic for Insurance
 
Blockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challengesBlockchain overview, use cases, implementations and challenges
Blockchain overview, use cases, implementations and challenges
 
Harrison lsri blockchain 2017
Harrison lsri blockchain 2017Harrison lsri blockchain 2017
Harrison lsri blockchain 2017
 
BlockChain Strategists - English presentation
BlockChain Strategists - English presentationBlockChain Strategists - English presentation
BlockChain Strategists - English presentation
 
Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017Sintesis informativa 29 de marzo 2017
Sintesis informativa 29 de marzo 2017
 
Bn1029 demo sap sd
Bn1029 demo  sap sdBn1029 demo  sap sd
Bn1029 demo sap sd
 
Getting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That WorksGetting It Right: “Bad Paper” Legislation That Works
Getting It Right: “Bad Paper” Legislation That Works
 
Bloco Esquerda
Bloco EsquerdaBloco Esquerda
Bloco Esquerda
 
Speed costs
Speed costsSpeed costs
Speed costs
 
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
Estrés. Cómo se produce un ataque de estrés y estrategias para manejarlo.
 

Similaire à FusionX & Accenture: One Global Security Team

Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.accenture
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.accenture
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Operations
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...Accenture Technology
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdfVograce
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityCyber Security Experts
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we ServeThe TNS Group
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case studycnnetwork
 
Fire eye investis case study
Fire eye investis case studyFire eye investis case study
Fire eye investis case studycnnetwork
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Accenture Operations
 

Similaire à FusionX & Accenture: One Global Security Team (20)

Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.Limit your vulnerabilities: Assess. Develop. Protect.
Limit your vulnerabilities: Assess. Develop. Protect.
 
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
DDHI Board Report.ppsx
DDHI Board Report.ppsxDDHI Board Report.ppsx
DDHI Board Report.ppsx
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Cyber Security Audit.pdf
Cyber Security Audit.pdfCyber Security Audit.pdf
Cyber Security Audit.pdf
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
FireEye investis case study
FireEye investis case studyFireEye investis case study
FireEye investis case study
 
Fire eye investis case study
Fire eye investis case studyFire eye investis case study
Fire eye investis case study
 
Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure Continuous cyber attacks: Building the next-gen infrastructure
Continuous cyber attacks: Building the next-gen infrastructure
 

Plus de accenture

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024accenture
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023accenture
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education accenture
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial Systemaccenture
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyaccenture
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023accenture
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operationsaccenture
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Studyaccenture
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023accenture
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented changeaccenture
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% meaccenture
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023accenture
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoaccenture
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industryaccenture
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023accenture
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accentureaccenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accentureaccenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chainaccenture
 

Plus de accenture (20)

The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024The Industrialist: Trends & Innovations - January 2024
The Industrialist: Trends & Innovations - January 2024
 
The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023The Industrialist: Trends & Innovations - September 2023
The Industrialist: Trends & Innovations - September 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023The Industrialist: Trends & Innovations - July 2023
The Industrialist: Trends & Innovations - July 2023
 
Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education Accenture Technology Vision - How the trends apply to higher education
Accenture Technology Vision - How the trends apply to higher education
 
Digital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial SystemDigital Euro: Implications for the Financial System
Digital Euro: Implications for the Financial System
 
More deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journeyMore deals, less money: the Black founder funding journey
More deals, less money: the Black founder funding journey
 
The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023The Industrialist: Trends & Innovations - June 2023
The Industrialist: Trends & Innovations - June 2023
 
Reinventing Enterprise Operations
Reinventing Enterprise OperationsReinventing Enterprise Operations
Reinventing Enterprise Operations
 
Semiconductor Gender Parity Study
Semiconductor Gender Parity StudySemiconductor Gender Parity Study
Semiconductor Gender Parity Study
 
The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023The Industrialist: Trends & Innovations - March 2023
The Industrialist: Trends & Innovations - March 2023
 
Nonprofit reinvention in a time of unprecedented change
 Nonprofit reinvention in a time of unprecedented change Nonprofit reinvention in a time of unprecedented change
Nonprofit reinvention in a time of unprecedented change
 
Free to be 100% me
Free to be 100% meFree to be 100% me
Free to be 100% me
 
The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023The Industrialist: Trends & Innovations - February 2023
The Industrialist: Trends & Innovations - February 2023
 
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimentoMundo gamer e a oportunidade de entrada pela abordagem do movimento
Mundo gamer e a oportunidade de entrada pela abordagem do movimento
 
Pathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications IndustryPathways to Profitability for the Communications Industry
Pathways to Profitability for the Communications Industry
 
The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023The Industrialist: Trends & Innovations - January 2023
The Industrialist: Trends & Innovations - January 2023
 
Reimagining the Agenda | Accenture
Reimagining the Agenda | AccentureReimagining the Agenda | Accenture
Reimagining the Agenda | Accenture
 
Climate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | AccentureClimate Leadership Eleventh Hour | Accenture
Climate Leadership Eleventh Hour | Accenture
 
Sustainable Value Chain
Sustainable Value ChainSustainable Value Chain
Sustainable Value Chain
 

Dernier

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

FusionX & Accenture: One Global Security Team

  • 2. 2 FusionX An elite and sophisticated cyber security team Copyright © 2015 Accenture All rights reserved. • 20-year legacy providing tactical vulnerability assessment and surgical penetration testing services against a wide variety of organizations and targets. • Focused on unique talent and experience of our elite assessment team, rather than on automated tools. • Targets information assets using the tailored tactics, techniques and procedures (TTP’s) of your most likely attackers to evaluate resiliency to a real-world attack. • Develops effective risk management strategies that focus on current and emerging threats while maintaining efficient business operations.
  • 3. 3Copyright © 2015 Accenture All rights reserved. FusionX works with your management and security teams to align your risk management practices and procedures with organizational goals and expectations. The end result? A comprehensive risk management program, nuanced to your unique business environment. Our Approach Leading businesses to a unique and comprehensive plan for implementation
  • 4. 4Copyright © 2015 Accenture All rights reserved. FusionX’s advanced threat capabilities complement Accenture’s security experience, technology and teams to address the toughest cyber security challenges. Accenture’s industrialized suite of offerings—including Digital Identity, Cyber Defense, and Managed Security—embed security into the fabric of digital operations, enabling agility, protecting the broader ecosystem and delivering sustainable business outcomes. Together, we help clients remediate cyber security weaknesses—at a global scale. FusionX & Accenture Helping clients manage risk and improve business results—globally
  • 5. 5Copyright © 2015 Accenture All rights reserved. FusionX Successes
  • 6. 6 The Outside Insider Copyright © 2015 Accenture All rights reserved. The situation A publicly traded company believes they have an insider engaging in malicious activity. FusionX deploys an Incident Response team to investigate. The support FusionX works with the client’s staff to investigate the incident and discovers that the incident is actually the work of organized crime engaging in large-scale fraud impacting hundreds of thousands of customers. The solution FusionX identifies the attack pathways, engages in attribution activities and devises a strategy to oust the attackers and secure the network from future attack.
  • 7. 7 Boardroom Blues Copyright © 2015 Accenture All rights reserved. The situation A multi-billion dollar investment firm engages FusionX for an enterprise wide, tactical penetration test. The support The team discovers dozens of critical vulnerabilities, including one that allows the team to eavesdrop on the board room via the Internet. The solution FusionX identifies the enterprise vulnerabilities and provides prioritized recommendations for remediation. Subsequent assessments reveal a significantly improved vulnerability profile.
  • 8. 8 Crown Jewels Copyright © 2015 Accenture All rights reserved. The situation The CEO of a Global 100 company wants to know how well his company’s intellectual property is protected from a sophisticated adversary. FusionX engages in a penetration test without the knowledge of the corporate security team. The support FusionX discovers a zero-day vulnerability in a custom-built application that allows the attack team to successfully and silently penetrate the corporate network. Within weeks, the team has exfiltrated gigabytes of sensitive data from the division the CEO wanted specifically targeted. The solution The CEO is able to re-align security priorities and the internal security team mitigates the vulnerabilities discovered by the FusionX team.
  • 9. 9 Money for Nothing Copyright © 2015 Accenture All rights reserved. The situation A large domestic bank has spent millions of dollars on security testing and products. The CISO challenges FusionX to find something they’ve missed. The support Within a week, FusionX identifies a systemic, zero-day vulnerability on their Internet-facing web application that allows the virtual creation and withdrawal of funds. The solution The bank quickly moves to remediate the issue with a temporary fix and commences a long-term project to remediate the systemic problem. FusionX provides further data to the bank to ensure that the issue has not been previously exploited. Ultimately, the vulnerability was identified prior to being exploited by a sophisticated attacker.
  • 10. About Accenture Accenture is a global management consulting, technology services and outsourcing company, with more than 336,000 people serving clients in more than 120 countries. Combining unparalleled experience, comprehensive capabilities across all industries and business functions, and extensive research on the world’s most successful companies, Accenture collaborates with clients to help them become high-performance businesses and governments. The company generated net revenues of US$30.0 billion for the fiscal year ended Aug. 31, 2014. Its home page is www.accenture.com. Copyright © 2015 Accenture All rights reserved. Accenture, its logo, and High Performance Delivered are trademarks of Accenture. Contact us www.fusionx.com accenture.com/security